Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Meinten Sie law?
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- security 11 Treffer
- rfid 6 Treffer
- aes 4 Treffer
- authentication 4 Treffer
- authentication protocol 4 Treffer
-
45 weitere Werte:
- key management 4 Treffer
- privacy 4 Treffer
- cloud computing 3 Treffer
- cryptography 3 Treffer
- dct 3 Treffer
- digital watermarking 3 Treffer
- dwt 3 Treffer
- encryption 3 Treffer
- hash function 3 Treffer
- intrusion detection 3 Treffer
- network security 3 Treffer
- performance evaluation 3 Treffer
- watermarking 3 Treffer
- wireless sensor networks 3 Treffer
- access control 2 Treffer
- copyright protection 2 Treffer
- des 2 Treffer
- e-commerce 2 Treffer
- embedded system 2 Treffer
- genetic algorithm 2 Treffer
- mitm 2 Treffer
- risk assessment 2 Treffer
- rsa 2 Treffer
- session key 2 Treffer
- smart card 2 Treffer
- spectrum sensing 2 Treffer
- static analysis 2 Treffer
- steganography 2 Treffer
- trusted computing 2 Treffer
- wormhole attack 2 Treffer
- #-mail 1 Treffer
- 60 ghz 1 Treffer
- aco 1 Treffer
- aggregate signature 1 Treffer
- analytic network process 1 Treffer
- anhydride 1 Treffer
- anonymity 1 Treffer
- anonymous authentication 1 Treffer
- anonymous communication 1 Treffer
- anp 1 Treffer
- app 1 Treffer
- attack 1 Treffer
- attribute 1 Treffer
- authorized electronic address 1 Treffer
- autoencoder 1 Treffer
116 Treffer
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-04-30), Heft 4, S. 117-124academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 11-24academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 157-164academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 225-234academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 329-342academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-09-30), Heft 5, S. 131-138academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 275-284academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 271-288academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 191-206academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 109-120academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 365-374academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 269-280academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 267-278academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-02-28), Heft 2, S. 27-38academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 201-208academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 1-20academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 21-30academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 179-188academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 211-220academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 37-48academicJournalZugriff: